banner Expire 10 May 2025
adv exp at 20 January 2025
Rescator cvv and dump shop
Money Club cc shop
Patrick Stash
banner expire at 13 August 2024
Kfc Club
BidenCash Shop
Luki Crown
Wizard's shop 2.0
Trump cc shop
Blackstash cc shop
Yale lodge shop
UniCvv
Carding.pw carding forum

Search results

  1. Mr.Tom

    What is Firewall -Introduction to Firewalls

    Introduction to firewalls When you use internet in your college/school/offfice , You may not be access some websites, right? Do you know how they block those websites? They use firewalls for block websites. Firewall prevent the system from hackers attack. Lets us what is firewall. What is...
  2. Mr.Tom

    How to secure your system from Keyloggers

    Now a days keylogger is major problem for all. So we should learn to secure our computer from keylogger. This article will help for ethical hackers or who want to protect their pc. What is Keylogger? Keylogger is one of spyware which will what type you through the keyboard and send it to...
  3. Mr.Tom

    C program and how to compile it.

    Hackers should have at least basic knowledge about programming. Plenty of hackers choose python as their first language. Thought it is good scripting language, i would suggest you to start from a solid programming language. So, the best one is C Programming. You may not be using the C...
  4. Mr.Tom

    How to change the icon of EXE file

    As i hacker, we need to learn how to change the icon of executable file(exe). So that we can change the icon of virus files while sending to victims. This tutorial will teach you how to change the icon of exe file. 1. Goto www.shelllabs.com and download the trial version of Icon Changer and...
  5. Mr.Tom

    Create a virus program to disable the USB ports in C program

    All budding hackers eager to learn how to create a virus . Here is simple tutorial which will make a virus in c program(no need to worry ,if you don’t know about c program because coding is here for you). Steps to follow: 1. Download the source files from here: Download 2. Extract the...
  6. Mr.Tom

    What is computer hacking? Introduction to Hacking

    What is computer hacking? In a cyber security world, the person who is able to discover weakness in a system and managed to exploit it to accomplish his goal referred as a Hacker , and the process is referred as Hacking. Now a days, People started think that hacking is only hijacking Facebook...
  7. Mr.Tom

    Make speak what a type -have a fun with windows xp

    No need to install any software or no need to download anything. here is the simplest trick to make xp to speak what you type. open Notepad and type the following text: save it as “filename.vbs” Then open the file. it’ll ask you enter text,within 1 second you can hear the sound.
  8. Mr.Tom

    Different types of Email Account Hacking

    The Basic level Hacking is Email Account Hacking. Everyone like to do first email account hacking only. So here is the tutorial for budding hackers about email Hacking. There are different types of Email Account Hacking . Here is some of them : Social Engineering Phishing Brute Force...
  9. Mr.Tom

    How to create fake or Phishing web page for gmail

    This post will explain you how to create fake or phishing web page for gmail. This Procedure can be used to make fake page for other websites like yahoo,msn,or any other sites which you want to steal the password of particular user. Steps for Creating Phishing or Fake web Page: Step 1: Go to the...
  10. Mr.Tom

    Delete Your Facebook Account permanently

    If you decide to delete your facebook account permanently then this tutorial is for you. In facebook when you deactivate your account from Account page, your profile and all information associated with it are inaccessible to the other users. In future if you decide to use your account ,you can...
  11. Mr.Tom

    Get IP address ,Location of Anyone in very simple way

    If you like to hack your friend your system , then you should know first his IP address. There are several methods to get ip address of them. But this is simple to implement it. In this process you need to make your friend to click the link which you send him. When he click the link ,it will...
  12. Mr.Tom

    create shortcut for shutdown

    Obviously everyone want shortcut for everything. Here is the trick to create a shortcut for shutdown on Desktop.Follow the steps., Step1: Right click on your desktop.click new and click new shortcut. Step2:a small window will open. for shutdown type as “shutdown -s -t 00 for logoff type as...
  13. Mr.Tom

    Trace the location , service provider of mobile number

    what is the use of tracing the mobile number? If some one disturbing you from unknown no, you can trace the location of their number. It may use for annoying prank calls, blackmails, unknown number in a missed call list or similar. Even though it is not possible to trace the number back...
  14. Mr.Tom

    How to protect your email account from being hacked

    Protect Yourself Now a days almost hackers are increasing in the level . At any time your email account can be hacked, if you didn’t aware about the security. So you should know how to protect your mail account. Most of them lost their email account because of not knowing the basic security...
  15. Mr.Tom

    Non-Vbv 2022 Updated List Of (easy) Cardable Sites

    – https://www.bdfugue.com/ Comics / manga. No security can deliver in BAL depending on the size of the package. – https://www.hardgraft.com/ Stylish leather objects mainly (iPhone pouch, purse, bag) – www.sonovente.com Do not exceed €250/300 for the first order and then for the second you can...
  16. Mr.Tom

    15 most needed Network security/Hacking tools

    1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP...
  17. Mr.Tom

    How to Create your own FTP Server in your system using Serv-U 10.0 FTP Server

    In this post i will guide you to how to create a FTP server in your home. Though there is lot of steps to folow, but it is very simple to do that. So i just follow my steps . What you need? Serv-U 10.0 or other versions No-IP.com Website Step 1: How to get the static address in NO-IP.COM...
  18. Mr.Tom

    How to Customize the Login Wallpaper in Windows 7

    In windows 7 ,it is easy to change the Login Screen Wallpaper. This trick will look very cool. Don’t worry no problem will arise. You can simply change it by editing Registry. Steps to Follow: Step 1: 1. The image you need to set as the background should be a .jpg file and it’s size should...
  19. Mr.Tom

    Alternative for Command prompt. Use if cmd is blocked

    Most of Internet cafe or some other public access computer has command prompt blocked. Command prompt is blocked for some security reasons. But without command prompt it is very hard to hack the networking system or the same pc. There are several tweaks and hacks to enable command prompt, but...
Top